Skip to main content
Erschienen in: Quantum Information Processing 8/2013

01.08.2013

Quantum private comparison protocol based on entanglement swapping of \(d\)-level Bell states

verfasst von: Fen Zhuo Guo, Fei Gao, Su Juan Qin, Jie Zhang, Qiao Yan Wen

Erschienen in: Quantum Information Processing | Ausgabe 8/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we propose a quantum private comparison protocol based on entanglement swapping, where two distrustful parties can compare the values of their secrets with the help of a semi-trusted third party. The protocol can determine not only whether two secrets are equal, but also the size relationship between them. The two parties can deduce the comparison result based on the keys shared between them and the announcement of the third party. Others including the third party will learn nothing about the values of the secrets, as well as the comparison result. The security of our protocol is analyzed. Furthermore, all the particles can be reused in the same protocol model theoretically. So our protocol is efficient and feasible to expand in network service, which in turn gives a solution to the left problem in Lin et al. (Quantum Inf Process, doi:10.​1007/​s11128-012-0395-6, 2012).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bennett, C.H., Brassard, G.: in IEEE International Conference on Computers, Systems and Signal Processing. IEEE, New York: Bangalore, pp. 175–179 (1984) Bennett, C.H., Brassard, G.: in IEEE International Conference on Computers, Systems and Signal Processing. IEEE, New York: Bangalore, pp. 175–179 (1984)
3.
Zurück zum Zitat Bose, S., Vedral, V., Knight, P.L.: Multiparticle generalization of entanglement swapping. Phys. Rev. A. 57, 822 (1998)ADSCrossRef Bose, S., Vedral, V., Knight, P.L.: Multiparticle generalization of entanglement swapping. Phys. Rev. A. 57, 822 (1998)ADSCrossRef
4.
Zurück zum Zitat Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)ADSCrossRef Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)ADSCrossRef
5.
Zurück zum Zitat Boudot, F., Schoenmakers, B., Traore, J.: A fair and efficient solution to the socialist millionaires problem. Discr. Appl. Math. (Special Issue on Coding and Cryptology) 111, 23–25 (2001)MathSciNetMATHCrossRef Boudot, F., Schoenmakers, B., Traore, J.: A fair and efficient solution to the socialist millionaires problem. Discr. Appl. Math. (Special Issue on Coding and Cryptology) 111, 23–25 (2001)MathSciNetMATHCrossRef
6.
Zurück zum Zitat Cerf, N.J., Bourennane, M., et al.: Security of quantum key distribution using d-level systems. Phys. Rev. Lett. 88, 127902 (2002)ADSCrossRef Cerf, N.J., Bourennane, M., et al.: Security of quantum key distribution using d-level systems. Phys. Rev. Lett. 88, 127902 (2002)ADSCrossRef
7.
Zurück zum Zitat Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283, 1561–1565 (2010)ADSCrossRef Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283, 1561–1565 (2010)ADSCrossRef
8.
Zurück zum Zitat Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A. 68, 042317 (2003)ADSCrossRef Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A. 68, 042317 (2003)ADSCrossRef
10.
Zurück zum Zitat Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the BradlerCDusek protocol. Quantum Inf. Comput. 7, 329 (2007)MathSciNetMATH Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the BradlerCDusek protocol. Quantum Inf. Comput. 7, 329 (2007)MathSciNetMATH
11.
Zurück zum Zitat Guo, F.Z., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis and improvement of two GHZ-state-based QSDC protocols. Chin. Phys. Lett. 27(9), 090307 (2010)ADSCrossRef Guo, F.Z., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis and improvement of two GHZ-state-based QSDC protocols. Chin. Phys. Lett. 27(9), 090307 (2010)ADSCrossRef
12.
Zurück zum Zitat Guo, F.Z., Gao, F., Wen, Q.Y., Zhu, F.C.: A two-step channel-encrypting quantum key distribution protocol. Int. J. Quantum Inf. 8(6), 1013–1022 (2010)MATHCrossRef Guo, F.Z., Gao, F., Wen, Q.Y., Zhu, F.C.: A two-step channel-encrypting quantum key distribution protocol. Int. J. Quantum Inf. 8(6), 1013–1022 (2010)MATHCrossRef
14.
Zurück zum Zitat Jia, H.Y., Wen, Q.Y., Song, T.T., Gao, F.: Quantum protocol for millionaire problem. Opt. Commun. 284, 545–549 (2011)ADSCrossRef Jia, H.Y., Wen, Q.Y., Song, T.T., Gao, F.: Quantum protocol for millionaire problem. Opt. Commun. 284, 545–549 (2011)ADSCrossRef
15.
Zurück zum Zitat Jia, H.Y., Wen, Q.Y., Li, Y.B., Gao, F.: Quantum private comparison using genuine four-particle entangled states. Int. J. Theor. Phys. 51, 1187–1194 (2012)MathSciNetMATHCrossRef Jia, H.Y., Wen, Q.Y., Li, Y.B., Gao, F.: Quantum private comparison using genuine four-particle entangled states. Int. J. Theor. Phys. 51, 1187–1194 (2012)MathSciNetMATHCrossRef
16.
Zurück zum Zitat Karimipour, V., Bahraminasab, A.: Quantum key distribution for d-level systems with generalized Bell states. Phys. Rev. A. 65, 052331 (2002)ADSCrossRef Karimipour, V., Bahraminasab, A.: Quantum key distribution for d-level systems with generalized Bell states. Phys. Rev. A. 65, 052331 (2002)ADSCrossRef
17.
18.
Zurück zum Zitat Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Quantum secure direct communication with chi-type entangled states. Phys. Rev. A. 78, 064304 (2008)ADSCrossRef Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Quantum secure direct communication with chi-type entangled states. Phys. Rev. A. 78, 064304 (2008)ADSCrossRef
19.
Zurück zum Zitat Liu, B., Gao, F., Jia, H.Y., Huang, W., Zhang, W.W., Wen, Q.Y.: Efficient quantum private comparison employing single photons and collective detection. Quantum. Inf. Process., doi:10.1007/s11128-012-0439-y, (2012) Liu, B., Gao, F., Jia, H.Y., Huang, W., Zhang, W.W., Wen, Q.Y.: Efficient quantum private comparison employing single photons and collective detection. Quantum. Inf. Process., doi:10.​1007/​s11128-012-0439-y, (2012)
21.
Zurück zum Zitat Liu, W., Wang, Y.B., Jiang, Z.T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284, 3160–3163 (2011)ADSCrossRef Liu, W., Wang, Y.B., Jiang, Z.T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284, 3160–3163 (2011)ADSCrossRef
22.
Zurück zum Zitat Liu, B., Gao, F., Wen, Q.Y.: Single-photon multiparty quantum cryptographic protocols with collective detection. IEEE J. Quantum Electron. 47, 1389–1390 (2011)ADS Liu, B., Gao, F., Wen, Q.Y.: Single-photon multiparty quantum cryptographic protocols with collective detection. IEEE J. Quantum Electron. 47, 1389–1390 (2011)ADS
23.
Zurück zum Zitat Liu, W., Wang, Y.B., Cui, W.: Quantum private comparison protocol based on bell entangled states. Commun. Theor. Phys. 57, 583–588 (2012)ADSMATHCrossRef Liu, W., Wang, Y.B., Cui, W.: Quantum private comparison protocol based on bell entangled states. Commun. Theor. Phys. 57, 583–588 (2012)ADSMATHCrossRef
24.
Zurück zum Zitat Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z.: A protocol for the quantum private comparison of equality with \(\chi \)-type state. Int. J. Theor. Phys. 51, 69–77 (2012)MathSciNetMATHCrossRef Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z.: A protocol for the quantum private comparison of equality with \(\chi \)-type state. Int. J. Theor. Phys. 51, 69–77 (2012)MathSciNetMATHCrossRef
25.
Zurück zum Zitat Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z., Cui, W.: New quantum private comparison protocol using \(\chi \)-type state. Int. J. Theor. Phys. 51, 1953–1960 (2012)MathSciNetMATHCrossRef Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z., Cui, W.: New quantum private comparison protocol using \(\chi \)-type state. Int. J. Theor. Phys. 51, 1953–1960 (2012)MathSciNetMATHCrossRef
26.
Zurück zum Zitat Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A. 56(2), 1154–1162 (1997)ADSCrossRef Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A. 56(2), 1154–1162 (1997)ADSCrossRef
27.
Zurück zum Zitat Ma, J.J., Guo, F.Z., Yang, Q., et al.: Semi-loss-tolerant strong coin flipping protocol using EPR pairs. Quantum Inf. Comput. 12, 0490–0501 (2012)MathSciNet Ma, J.J., Guo, F.Z., Yang, Q., et al.: Semi-loss-tolerant strong coin flipping protocol using EPR pairs. Quantum Inf. Comput. 12, 0490–0501 (2012)MathSciNet
28.
Zurück zum Zitat Pan, J.W., Bouwmeester, D., et al.: Experimental entanglement swapping: entangling photons that never interacted. Phys. Rev. Lett. 80, 3891 (1998)MathSciNetADSMATHCrossRef Pan, J.W., Bouwmeester, D., et al.: Experimental entanglement swapping: entangling photons that never interacted. Phys. Rev. Lett. 80, 3891 (1998)MathSciNetADSMATHCrossRef
30.
Zurück zum Zitat Tseng, H.Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum. Inf. Process. 11, 373–384 (2012)MathSciNetMATHCrossRef Tseng, H.Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum. Inf. Process. 11, 373–384 (2012)MathSciNetMATHCrossRef
31.
Zurück zum Zitat Yang, Y.G., Xia, J., Jia, X., Zhang, H.: Comment on “quantum private comparison protocols with a semi-honest third party”. Quantum. Inf. Process., doi:10.1007/s11128-012-0433-4 (2012) Yang, Y.G., Xia, J., Jia, X., Zhang, H.: Comment on “quantum private comparison protocols with a semi-honest third party”. Quantum. Inf. Process., doi:10.​1007/​s11128-012-0433-4 (2012)
32.
Zurück zum Zitat Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A-Math. Theor. 42, 055305 (2009)MathSciNetADSCrossRef Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A-Math. Theor. 42, 055305 (2009)MathSciNetADSCrossRef
33.
Zurück zum Zitat Yang, Y.G., Cao, W.F., Wen, Q.Y.: Secure quantum private comparison. Phys. Scr. 80(6), 065002 (2009)ADSCrossRef Yang, Y.G., Cao, W.F., Wen, Q.Y.: Secure quantum private comparison. Phys. Scr. 80(6), 065002 (2009)ADSCrossRef
34.
Zurück zum Zitat Yao, A.C.: Protocols for secure computations. In: Proceedings of 23rd IEEE Symposium on Foundations of Computer Science (FOCS’ 82). Washington, DC, USA, pp. 160 (1982) Yao, A.C.: Protocols for secure computations. In: Proceedings of 23rd IEEE Symposium on Foundations of Computer Science (FOCS’ 82). Washington, DC, USA, pp. 160 (1982)
36.
37.
Zurück zum Zitat Zukowski, M., Zeilinger, A., Horne, M.A., Ekert, A.K.: “Event-ready-detectors” Bell experiment via entanglement swapping. Phys. Rev. Lett. 71, 4287 (1993)ADSCrossRef Zukowski, M., Zeilinger, A., Horne, M.A., Ekert, A.K.: “Event-ready-detectors” Bell experiment via entanglement swapping. Phys. Rev. Lett. 71, 4287 (1993)ADSCrossRef
Metadaten
Titel
Quantum private comparison protocol based on entanglement swapping of -level Bell states
verfasst von
Fen Zhuo Guo
Fei Gao
Su Juan Qin
Jie Zhang
Qiao Yan Wen
Publikationsdatum
01.08.2013
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 8/2013
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-013-0536-6

Weitere Artikel der Ausgabe 8/2013

Quantum Information Processing 8/2013 Zur Ausgabe